DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobil ....Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobile environments. This should protect the privacy of individuals and increase users’ trust in location-based systems.Read moreRead less
Blockchain-Enabled Federated Learning for Secure and Decentralised Learning. This project aims to develop novel blockchain-enabled federated learning techniques for secure and decentralised learning. It addresses an important and urgent machine learning problem, that is, the data useful for training machine learning models are often held by different owners who are not willing to share their data due to privacy concerns, resulting in isolated data islands. The project will result in a set of inn ....Blockchain-Enabled Federated Learning for Secure and Decentralised Learning. This project aims to develop novel blockchain-enabled federated learning techniques for secure and decentralised learning. It addresses an important and urgent machine learning problem, that is, the data useful for training machine learning models are often held by different owners who are not willing to share their data due to privacy concerns, resulting in isolated data islands. The project will result in a set of innovative algorithms that provide solutions to the key challenges in blockchain-enabled federated learning. The expected outcomes of the project will dramatically advance the frontier of machine learning and blockchain research, and have massive social and economic benefits for Australia and international communities.Read moreRead less
Private searching on streaming data. This project aims to explore secure and practical solutions for various internet search types and to develop a prototype of a private searching system to avoid compromising user privacy whilst sharing query requests. Searching of streaming data allows collection of useful information from huge streaming sources of data such as on-line news feeds and internet chat-rooms. Current solutions for this problem are inefficient and restricted to a couple of simple se ....Private searching on streaming data. This project aims to explore secure and practical solutions for various internet search types and to develop a prototype of a private searching system to avoid compromising user privacy whilst sharing query requests. Searching of streaming data allows collection of useful information from huge streaming sources of data such as on-line news feeds and internet chat-rooms. Current solutions for this problem are inefficient and restricted to a couple of simple search types, and vulnerable to identifying the search requester. The project expects to develop private searching tools to protect the privacy of user's search queries. This will have the potential to detect any attacks to our digital infrastructure while keeping the search criteria classified, and could have applications in Australian counter-terrorism and homeland defence.Read moreRead less
Cost-effective App Service Management in Edge Computing Environment. This project aims to deliver a framework and a suite of approaches for cost-effective app service management in the edge computing (EC) environment facilitated by the 5G mobile network. Edge computing offers great promises for rapidly advancing mobile and IoT apps in many active domains in Australia, e.g., self-driving cars, medical services, etc. Using a variety of optimization techniques and game theory, this project attacks ....Cost-effective App Service Management in Edge Computing Environment. This project aims to deliver a framework and a suite of approaches for cost-effective app service management in the edge computing (EC) environment facilitated by the 5G mobile network. Edge computing offers great promises for rapidly advancing mobile and IoT apps in many active domains in Australia, e.g., self-driving cars, medical services, etc. Using a variety of optimization techniques and game theory, this project attacks the new challenges in the deployment, delivery and adaptation of app services in the EC environment. The outcomes of this project will significantly promote new mobile and IoT apps over Australia's 5G mobile network by allowing app vendors to manage their services cost-effectively with ease in the EC environment.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less